Detection of Intrusions and Malware, and Vulnerability Assessment: Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings

Author:   Roland Büschkes ,  Pavel Laskov
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2006 ed.
Volume:   4064
ISBN:  

9783540360148


Pages:   195
Publication Date:   29 June 2006
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $145.07 Quantity:  
Add to Cart

Share |

Detection of Intrusions and Malware, and Vulnerability Assessment: Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2006, held in Berlin, Germany in July 2006. The 11 revised full papers presented were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on code analysis, intrusion detection, threat protection and response, malware and forensics, and deployment scenarios.

Full Product Details

Author:   Roland Büschkes ,  Pavel Laskov
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2006 ed.
Volume:   4064
Dimensions:   Width: 15.50cm , Height: 1.10cm , Length: 23.50cm
Weight:   0.670kg
ISBN:  

9783540360148


ISBN 10:   354036014
Pages:   195
Publication Date:   29 June 2006
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Code Analysis.- Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs.- Using Static Program Analysis to Aid Intrusion Detection.- Intrusion Detection.- An SVM-Based Masquerade Detection Method with Online Update Using Co-occurrence Matrix.- Network–Level Polymorphic Shellcode Detection Using Emulation.- Detecting Unknown Network Attacks Using Language Models.- Threat Protection and Response.- Using Labeling to Prevent Cross-Service Attacks Against Smart Phones.- Using Contextual Security Policies for Threat Response.- Malware and Forensics.- Detecting Self-mutating Malware Using Control-Flow Graph Matching.- Digital Forensic Reconstruction and the Virtual Security Testbed ViSe.- Deployment Scenarios.- A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs.- A Fast Worm Scan Detection Tool for VPN Congestion Avoidance.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List